Modified Gray Wolf Feature Selection and Machine Learning Classification for Wireless Sensor Network Intrusion Detection
PDF
PDF

How to Cite

Shakya, Subarna. 2021. “Modified Gray Wolf Feature Selection and Machine Learning Classification for Wireless Sensor Network Intrusion Detection”. IRO Journal on Sustainable Wireless Systems 3 (2): 118-27. https://doi.org/10.36548/jsws.2021.2.006.

Keywords

— Machine learning
— Support vector machine
— Intrusion detection
— Wireless sensor networks
— Grey wolf optimization algorithm
Published: 14-06-2021

Abstract

The ability of wireless sensor networks (WSN) and their functions are degraded or eliminated by means of intrusion. To overcome this issue, this paper presents a combination of machine learning and modified grey wolf optimization (MLGWO) algorithm for developing an improved intrusion detection system (IDS). The best number of wolves are found by running tests with multiple wolves in the model. In the WSN environment, the false alarm rates are reduced along with the reduction in processing time while improving the rate of detection and the accuracy of intrusion detection with a decrease in the number of resultant features. In order to evaluate the performance of the proposed model and to compare it with the existing techniques, the NSL KDD’99 dataset is used. In terms of detection rate, false alarm rate, execution time, total features and accuracy the evaluation and comparison is performed. From the evaluation results, it is evident that higher the number of wolves, the performance of the MLGWO model is enhanced.

References

  1. RM, S. P., Maddikunta, P. K. R., Parimala, M., Koppu, S., Gadekallu, T. R., Chowdhary, C. L., & Alazab, M. (2020). An effective feature engineering for DNN using hybrid PCA-GWO for intrusion detection in IoMT architecture. Computer Communications, 160, 139-149.
  2. Mugunthan, S. R., & Vijayakumar, T. (2021). Design of Improved Version of Sigmoidal Function with Biases for Classification Task in ELM Domain. Journal of Soft Computing Paradigm (JSCP), 3(02), 70-82.
  3. Dutta, S., & Banerjee, A. (2020). Highly Precise Modified Blue Whale Method Framed by Blending Bat and Local Search Algorithm for the Optimality of Image Fusion Algorithm. Journal of Soft Computing Paradigm (JSCP), 2(04), 195-208.
  4. Wilson, A. J., & Giriprasad, S. (2020). A Feature Selection Algorithm for Intrusion Detection System Based On New Meta-Heuristic Optimization. Journal of Soft Computing and Engineering Applications, 1(1).
  5. Smys, S., Basar, A., & Wang, H. (2020). Hybrid intrusion detection system for internet of Things (IoT). Journal of ISMAC, 2(04), 190-199.
  6. Baraneetharan, E. (2020). Role of Machine Learning Algorithms Intrusion Detection in WSNs: A Survey. Journal of Information Technology, 2(03), 161-173.
  7. Çavuşoğlu, Ü. (2019). A new hybrid approach for intrusion detection using machine learning methods. Applied Intelligence, 49(7), 2735-2761.
  8. Shakya, Subarna. "Process mining error detection for securing the IoT system." Journal of ISMAC 2, no. 03 (2020): 147-153.
  9. Kunhare, N., Tiwari, R., & Dhar, J. (2020). Particle swarm optimization and feature selection for intrusion detection system. Sādhanā, 45, 1-14.
  10. Bashar, Abul. "Sensor Cloud Based Architecture with Efficient Data Computation and Security Implantation for Internet of Things Application." Journal of ISMAC 2, no. 02 (2020): 96-105
  11. Tubishat, M., Idris, N., Shuib, L., Abushariah, M. A., & Mirjalili, S. (2020). Improved Salp Swarm Algorithm based on opposition based learning and novel local search algorithm for feature selection. Expert Systems with Applications, 145, 113122.
  12. Jacob, I. J., & Darney, P. E. (2021). Artificial Bee Colony Optimization Algorithm for Enhancing Routing in Wireless Networks. Journal of Artificial Intelligence, 3(01), 62-71.
  13. Davahli, A., Shamsi, M., & Abaei, G. (2020). Hybridizing genetic algorithm and grey wolf optimizer to advance an intelligent and lightweight intrusion detection system for IoT wireless networks. Journal of Ambient Intelligence and Humanized Computing, 11(11), 5581-5609.
  14. Rahman, M. A., Asyhari, A. T., Wen, O. W., Ajra, H., Ahmed, Y., & Anwar, F. (2021). Effective combining of feature selection techniques for machine learning-enabled IoT intrusion detection. Multimedia Tools and Applications, 1-19.
  15. Chen, D. J. I. Z., & Lai, K. L. (2020). Internet of Things (IoT) Authentication and Access Control by Hybrid Deep Learning Method-A Study. Journal of Soft Computing Paradigm (JSCP), 2(04), 236-245.
  16. Mugunthan, S. R. (2020). Decision Tree Based Interference Recognition for Fog Enabled IOT Architecture. Journal of trends in Computer Science and Smart technology (TCSST), 2(01), 15-25.
  17. Zhou, Y., Cheng, G., Jiang, S., & Dai, M. (2020). Building an efficient intrusion detection system based on feature selection and ensemble classifier. Computer Networks, 174, 107247.
  18. Shakya, S. (2020). Analysis of artificial intelligence based image classification techniques. Journal of Innovative Image Processing (JIIP), 2(01), 44-54.
  19. Abdulhammed, R., Musafer, H., Alessa, A., Faezipour, M., & Abuzneid, A. (2019). Features dimensionality reduction approaches for machine learning based network intrusion detection. Electronics, 8(3), 322.